CN1926807A - Medium control method for realizing legal monitoring using soft exchanging system - Google Patents

Medium control method for realizing legal monitoring using soft exchanging system Download PDF

Info

Publication number
CN1926807A
CN1926807A CNA2004800424304A CN200480042430A CN1926807A CN 1926807 A CN1926807 A CN 1926807A CN A2004800424304 A CNA2004800424304 A CN A2004800424304A CN 200480042430 A CN200480042430 A CN 200480042430A CN 1926807 A CN1926807 A CN 1926807A
Authority
CN
China
Prior art keywords
end points
shadow
monitored
descending
points
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2004800424304A
Other languages
Chinese (zh)
Other versions
CN100461715C (en
Inventor
徐伟
汤艳
蒋孝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UTStarcom Telecom Co Ltd
Original Assignee
UTStarcom Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UTStarcom Telecom Co Ltd filed Critical UTStarcom Telecom Co Ltd
Publication of CN1926807A publication Critical patent/CN1926807A/en
Application granted granted Critical
Publication of CN100461715C publication Critical patent/CN100461715C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Monitoring And Testing Of Exchanges (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A media control method for realizing the lawful interception includes the following steps: establish the up-shadow-termination corresponding to the intercepted termination in the context of the intercepted termination of the intercepted object, the up-shadow-termination is used to audit the up media flow of the intercepted object; establish the down-shadow-termination corresponding to the opposite termination in the context of the opposite termination of the intercepted termination, the down-shadow-termination is used to audit the down media flow of the intercepted object; and bridge the up-shadow-termination, the down-shadow-termination and intercepting termination corresponding to the interception center to the same conference bridge, wherein the up media flow and the down media flow of the intercepted object is mixed on the conference bridge through the up-shadow-termination and the down-shadow-termination. So the present invention realizes the interception function to the intercepted termination.

Description

Medium control method for realizing legal monitoring using soft exchanging system
T N2004/000431
Realized using soft exchanging system
The media control method technical field of legal prison sunrise
The present invention relates to the relevant technology of the media of the Lawful Interception function in communication network networking model, the method that Lawful Interception media are controlled under more particularly to a kind of soft exchanging system.Background technology
Lawful Interception refers to set by user according to certain legal procedure requirement telecom operators to carry out tracking and monitoring in real time to the traffic of specific user and non-traffic activity.Monitoring content includes the positional information of user, switchs machine information, call status information, sending and receiving short messages content, the content of call, data communication, fax sending and receiving content etc..With continuing to develop for the communication technology, increasing telecom operators require that system has the function of this Lawful Interception.
Softswitch technology is next generation network(NGN core technology), it is attached and communicated by the agreement of standard between each entity by the way that the call signaling control in conventional switch and media bearer are separated, it is achieved thereby that business is separated in Call- Control1.Media bearer access, resources control and management are by entity MGW (WMGs)Realize, CallServer (call servers)In for media control by entity MGC (Media Gateway Controllers)Realize.Control interface between Media Gateway Controller and WMG uses standard agreement standard, such as by IETF (Internet Engineering Task groups)The MGCP of proposition:MGCP(MGCP the MGCP) and by ITU-T formulated H.248/ Megaco agreements.
3GPP (third generation collaborative projects)Technical specification TS33.107-Lawful Interception Architecture and Functions in each functional entity of Lawful Interception is had been described in detail, therefore, the networking model that media are controlled in CallServer is that the implementation of DF3 functions is the key technology that Lawful Interception function is realized.We can N2004/000431
To pass through MGC (Media Gateway Controllers under the system of soft switch)With MGW (WMGs)Between the interface protocol of standard realize certain media networking, so as to not change call signaling control, call monitoring business is realized on the premise of using standard media gateway.
A kind of most media networking methods simple and easy to apply are the network connecting modes using local meeting bridge, as shown in Figure 1.Calling party A initiates a call to called subscriber B end points TB at its end points TA, and situation shown in Fig. 1 is situations of the calling party A and called subscriber B in different gateways, the wherein call context where calling party A(Call Context) 1 include middle end points TA, the call context 2 where called subscriber B includes middle end points TB, these middle end points constitute paths.When calling party A is monitored, that is in the case that calling party A is intercepted user, the end points TA of intercepted user and its corresponding Lawful Interception end points Tm of the end points TB and listening center of calling user are bridged in a meeting bridge of conference context 3, and the Media Stream after intercepted user A and its calling user B speech audio mixing is monitored using the sound mixing function of meeting bridge.Although this network connecting mode is simple, but this mode changes the networking pattern of monitored call, so as to have impact on the media control flow of original ordinary call, original ordinary call is set to become the MPTY based on meeting bridge, the various operations for popular endpoints become the operation for monitoring meeting bridge upper extreme point.Also, the media attended operation so to each supplementary service can send different media bind commands as whether user is monitored, form different Mei Ti Group pessimistic concurrency controls, and such change can make the suitable complexity of media control change and can not receive.The content of the invention
Regarding to the issue above, the present invention proposes the media control method that a kind of monitoring service is realized, it is based on the concept of " shadow end points ", monitored call is set to be attached to basic calling, it is connected by " up shadow end points " and " descending shadow end points " with the topology of monitored object and conversation object, so as to obtain the up-downgoing Media Stream of monitored object respectively, then 1
By monitored object " up-downgoing shadow end points, and listening center circuit bridge into a meeting bridge, utilize the sound mixing function of meeting bridge to monitor the Media Stream after the speech audio mixing of intercepted user and its conversation object.This network connecting mode does not change the connection of media topology and the media control flow of any original ordinary call.
According to another aspect of the present invention there is provided a kind of media control method for realizing Lawful Interception, following step is included:
1) up shadow end points corresponding with the monitored end points is set up in the context where the monitored end points of monitored object, the up shadow end points is for auditing the up of monitored object;
2) descending shadow end points corresponding with the opposite end end points is set up in the context of the opposite end end points of the monitored end points, the descending shadow end points is used for auditing the downlink media stream of monitored object;And
3) by the up shadow end points and descending shadow end points and monitoring point bridge corresponding with listening center to same meeting bridge,
The up and downlink media stream for being wherein monitored object flow the audio mixing on meeting bridge by the IP of the up shadow end points and descending shadow end points respectively, are achieved in the monitor function to being monitored end points.
According to an aspect of the invention, there is provided a kind of media control method, comprises the following steps:
1) by Megaco order Add, monitoring end points corresponding with monitored call media bearer is set up in a new context;
2) by Megaco order Add, the up shadow end points of increase auxiliary in the corresponding context of monitored end points where monitored object, it is used for auditing the up of monitored object;
3) by Megaco order Add, the descending shadow end points of increase auxiliary in the corresponding context of monitored end points where monitored object, it is used for auditing the downlink media stream of monitored object; 31
4) a tripartite talks bridge is set up by Megaco orders Add, including for being provided out first end point, the second end points and the 3rd end points of service;
5) it is the 3rd end points to increase an auxiliary IP point by contexts of the Megaco orders Add where end points is monitored and match somebody with somebody far-end IP;
6) it is first end point and the second end points respectively to be matched somebody with somebody the far-end IP of up shadow end points and descending shadow end points by Megaco orders Mod;
7) by Megaco order Mod, the two-way topology connection of the opposite end end points of up shadow end points and monitored end points is disconnected;
8) by Megaco order Mod, the two-way topology connection of descending shadow end points and monitored end points is disconnected.
Above and other objects of the present invention, feature, each side and advantage are will be seen that by referring to the following detailed description of accompanying drawing.Brief description of the drawings
The following drawings provides further understanding for the present invention, constitutes a part for specification, illustrates embodiments of the invention, the principle of the invention is explained together with explanatory note.
Fig. 1 is traditional Lawful Interception network model figure;
Fig. 2 is the Media Control FIGURE in WMG;
Fig. 3 is Lawful Interception media network networking model figure of the invention;
Fig. 4 is that basic call monitors media control flow chart.Embodiment
Below according to accompanying drawing, the embodiment of the present invention is specifically described.
Fig. 2 is the Media Control FIGURE in WMG.
As shown in Fig. 2 media control involved in the present invention uses soft switch framework, call signaling controls to be separated with media.MGC (media gateway controllings)Realize the control that media are set up, MG (WMGs)Realize that specific carrying is set up and resource management control 1
System.
MGC (media gateway controllings)For MG (WMGs)Control defer to standard ITU-T agreement Megaco (h.248).Pass through series of standards message defined in Megaco(Add, Subtract Modify) and standard message realize media networking model described later.
Wherein, end points(Termination) for Media Stream generation and(Or)Termination;Context(Context it is) a series of set for end points that are mutually related.There can be multiple associated end points in one context, this association can be by the different topology relationships between end points come exterior syndrome.Method proposed by the present invention utilizes this point, and auxiliary is added in the context of original calling " shadow, end points is connected using its unidirectional topology between the corresponding end points of media bearer of reason calling, so as to realize monitor function
Described according to h.248 agreement, MGC includes the modification of topology annexation between the modification for end points media bearer attribute and end points for the media flow control of end points.
End points media bearer attribute refers to the Media Stream transmitting-receiving attribute of end points, including:SendOnly (is only sent out), ReceiveOnly (only receive), SendReceive (transmitting-receiving), Inactive it is (unavailable), Loop (winding).
Topology connection refers to the transmission direction of Media Stream between two end points, including:OneWay is (unidirectional), BothWay it is (two-way), Isolate (without media connection).
The call monitoring media control networking model of the present invention is exactly to take full advantage of the media control mode of both standards to connect to change the media of end points in MG.
Fig. 3 shows the Lawful Interception media network networking model figure of the present invention.
As shown in Figure 3, calling party A initiates a call to called subscriber B end points TB at its end points TA, situation shown in Fig. 3 is situations of the calling party A and called subscriber B in different gateways, call context 1 wherein where calling party A includes opposite end end points TA, the call context 2 where called subscriber B includes opposite end end points TB, end points TA, TB, be constitute path middle end points.When calling party A is supervised Listen, i.e. calling party A is intercepted user, in the case that monitored end points is TA, the context where calling party A(Context) corresponding " the up shadow end points " UpT of its end points TA and its opposite end end points TA are increased in 1, corresponding " descending shadow end points " DownT, " up shadow end points " UpT and " descending shadow end points " DownT are IP end points, and media bearer attribute is that SendOnly (is only sent out)." up shadow end points " UpT only has two-way topology to be connected with monitored end points TA;" descending shadow end points, DownT only with opposite end end points TA, have two-way topology connection.Respectively by " up shadow end points " UpT and " descending shadow end points " DownT and listening center(It is not shown)Corresponding Lawful Interception end points Tm is bridged to a meeting bridge where conference context 3.So, the up and downlink media stream of intercepted user flow the audio mixing on meeting bridge by " up shadow end points " UpT and " descending shadow end points " DownT IP respectively, are so achieved that opposite end point TA monitor function.
Auxiliary IP points on " up shadow end points " UpT and " descending shadow end points " DownT and all meeting bridges and monitor end points Tm and all depend on monitored end points TA, and exist with monitored end points TA this relation must be preserved in master slave relation, MGC.
It is illustrated above so that calling party is monitored object as an example.It will be understood by those of skill in the art that can also called subscriber be eavesdropping target monitored.
Fig. 4 show the present invention and the media control flow chart corresponding to monitoring is realized to ordinary call.The media rate-determining steps are:
1) by Megaco order Add, in a new context(Monitoring end points Tm corresponding with monitored call media bearer is set up in $).
2) by Megaco order Add, increase auxiliary " up shadow end points " UpT in the corresponding context 1 of monitored end points where intercepted user A, it is used for auditing intercepted user A up.(Default, it is that two-way topology is connected between the end points and other end points in the context newly added)
3) by Megaco order Add, increase auxiliary " descending shadow end points " DownT in the corresponding context 1 of monitored end points where ^ listens user A, it is used To audit intercepted user A downlink media stream.
4) a tripartite talks bridge is set up by Megaco orders Add, it includes end points T1 (first end points), end points T2 (the second end points)With end points T3 (the 3rd end points), these end points are the end points that meeting bridge is provided out service.
5) it is end points T3 to increase an auxiliary IP point by contexts of the Megaco orders Add where end points Tm is monitored and match somebody with somebody far-end IP.
6) it is end points T1 and end points T2 respectively to be matched somebody with somebody shadow end points UpT and DownT far-end IP by Megaco orders Mod.
7) by Megaco order Mod, disconnect " up shadow end points " UpT and end points TA opposite end end points TA, between issuable two-way topology connection, to avoid possible crosstalk.
8) by Megaco order Mod, the issuable two-way topology connection of " descending shadow end points " between DownT and intercepted user end points TA is disconnected, to avoid possible crosstalk.
Because intercepted user may do miscellaneous service, such as Call Forwarding, exhale, MPTY, networking model will ensure that call monitoring is not influenceed and failure by these business.Obtained using the of the invention of soft exchanging system under networking model, not only ensure that this point, and call monitoring is a limited set for the media control flow of these business, and the element of set is 2.So, the media control flow of monitoring will not be increased because of the increase of business, this implementation method has good Universal and scalability.
Networking model shown in analysis chart 3, no matter which kind of business user A does, and has been only possible to two kinds of results:End points TA changes, end points TA, changes.Therefore, we can define two media control flows for both changes and monitor the reconstruction for connecting network to realize.Definition set《.
a = {Cl 3C2}
Q :End points TA change, delete shadow end points UpT and DownT, and in new end points TA contexts increase end points UpT and DownT, change meeting bridge on Corresponding IP points distal information, disconnect end points TA and end points DownT between topology connection, disconnect end points TA, and end points UpT between topology connection.
C2:Topology connection between end points TA, change, disconnection new end points TA' and end points UpT.
Business general can be analyzed:CH, CW, the 110 of user, user A initiations MPT Y can be classified as media control flow.
Call Forwarding, user B Call Retrieve, user B HO, user A, which participates in MPTY, can be classified as media control flow C2
Therefore, it is of the present invention and this solution call monitoring media control method
1) requirement of Lawful Interception function is met.
2) soft exchanging system structure is used, Call- Control1 is separated with media control, to realize call monitoring business and original call signaling that do not influence of increased media control flow is controlled, and the connection of media topology and the media control flow of original ordinary call are not changed yet.
3) media are controlled() and WMG MGC(MGW the interface between) defers to Megaco (h.248) agreement of standard.
4) when intercepted user carries out miscellaneous service operation, the influence to this monitoring media control is limited, and can to monitor by the media control operation of a finite aggregate is not influenceed by intercepted user business.
Therefore, as described above, the call monitoring media control of the present invention is realized by such a way:User initiates the calling to another end points from an end points.After call setup success, monitor initiating to call or receive call endpoints, corresponding " up shadow end points " and " descending shadow end points " is increased in the context of monitored end points.Described " up shadow end points " and " descending shadow end points " is the IP end points that media bearer attribute is SendOnly, and " up shadow end points " only has two-way topology to be connected with monitored end points;" descending shadow end points " only has two-way with the opposite end end points of monitored end points Topology is connected.Respectively by " shadow end points " and point bridge of monitoring corresponding with listening center to a meeting bridge.So, the up and downlink media stream of intercepted user flow the audio mixing on meeting bridge by the IP of " up shadow end points " and " descending shadow end points " respectively, are achieved that the function that end points is monitored.
" shadow end points, and auxiliary DP points on all meeting bridges and monitor end points and all depend on monitored end points, and exist with monitored end points this relation must be preserved in master slave relation, MGC.
The duplication and networking that the above-mentioned media control method for realizing Lawful Interception monitors Media Stream occur after calling and called are all successfully established.
In addition, this method also includes following treatment principle:
When deleting monitoring end points(Such as cease listening for), it is necessary to delete the auxiliary IP points on all " shadow end points " and all meeting bridges;End points is monitored when deleting(Such as intercepted user on-hook), it is necessary to delete the auxiliary IP points on all " shadow end points " and all meeting bridges and monitor end points;When monitored end points changes(As user exhale or switch more)When, " up shadow end points " and " descending shadow end points " is rebuild, and change the distal end attribute of IP points on meeting bridge;The opposite end end points for being monitored end points is changed(Such as peer user Call Forwarding)It is connected, it is necessary to disconnect " up shadow end points " with the topology of monitored opposite end end points.
The media control method of the Lawful Interception of the present invention is description above described, but the scope of the present invention is not limited to shown herein as the detail and exemplary embodiments with explanation.According to the above description and drawings and claims, those skilled in the art should be understood that, in the case where not departing from by the claims below and their equivalent limited the spirit and scope of the present invention, it can be made various changes, modifications and variations.

Claims (15)

  1. Claim
    1. a kind of media control method for realizing Lawful Interception, includes following step:
    1) up shadow end points corresponding with the monitored end points is set up in the context where the monitored end points of monitored object, the up shadow end points is for auditing the up of monitored object;
    2) descending shadow end points corresponding with the opposite end end points is set up in the context of the opposite end end points of the monitored end points, the descending shadow end points is used for auditing the downlink media stream of monitored object;And
    3) by the up shadow end points and descending shadow end points and monitoring point bridge corresponding with listening center to same meeting bridge,
    The up and downlink media stream for being wherein monitored object flow the audio mixing on meeting bridge by the IP of the up shadow end points and descending shadow end points respectively, are achieved in the monitor function to being monitored end points.
    2. the method as described in claim 1, it is characterised in that:The up shadow end points and descending shadow end points are the IP end points that attribute is sendonly.
    3. method as claimed in claim 1 or 2, wherein the up shadow end points is connected with the monitored end points topology, the descending shadow end points is connected with the opposite end end points topology of monitored end points.
    Carried out 4. the duplication and networking of the method as described in claim 1, wherein Media Stream are monitored after calling and called are successfully established.
    5. the method as described in claim 1, in addition to:Monitored topology connection between end points and descending shadow end points is disconnected, and disconnects the topology connection between the opposite end end points and up shadow end points of monitored end points.
    6. the method as described in claim 1, in addition to:When monitored end points changes, up shadow end points and descending shadow end points are rebuild in new monitored end points.
    7. method as claimed in claim 6, wherein rebuilding up in new monitored end points Shadow end points and descending shadow end points also include:Change the distal information of IP points corresponding with the shadow end points on meeting bridge.
    8. method as claimed in claim 7, wherein also including:On meeting bridge is changed after the distal information of IP points corresponding with the shadow end points, monitored topology connection between end points and descending shadow end points is disconnected, and disconnect the topology connection between the opposite end end points and up shadow end points of monitored end points.
    9. the method as described in claim 1, in addition to:When the opposite end end points for listening end points changes, disconnect up shadow end points and be connected with the topology of the opposite end end points of monitored end points.
    10. a kind of media control method, comprises the following steps:
    1) by Megaco order Add, monitoring end points corresponding with monitored call media bearer is set up in a new context;
    2) by Megaco order Add, the up shadow end points of increase auxiliary in the corresponding context of monitored end points where monitored object, it is used for auditing the up of monitored object;
    3) by Megaco order Add, the descending shadow end points of increase auxiliary in the corresponding context of monitored end points where monitored object, it is used for auditing the downlink media stream of monitored object;
    4) a tripartite talks bridge is set up by Megaco orders Add, including for being provided out first end point, the end points of the mat woven of fine bamboo strips two and the 3rd end points of service;
    5) it is the end points of the mat woven of fine bamboo strips three to increase an auxiliary IP point by contexts of the Megaco orders Add where end points is monitored and match somebody with somebody far-end IP;
    6) it is first end point and the second end points respectively to be matched somebody with somebody the far-end IP of up shadow end points and descending shadow end points by Megaco orders Mod;
    7) by Megaco order Mod, the two-way topology connection of the opposite end end points of up shadow end points and monitored end points is disconnected;
    8) by Megaco order Mod, descending shadow end points and monitored end points are disconnected Two-way topology connection.
    11. method as claimed in claim 10, it is characterised in that:The up shadow end points and descending shadow end points are the IP end points that attribute is sendonly.
    12. method as claimed in claim 10, in addition to:When monitored end points changes, up shadow end points and descending shadow end points are rebuild in new monitored end points.
    13. method as claimed in claim 12, wherein rebuilding up shadow end points and descending shadow end points in new monitored end points also includes:Change the distal information of IP points corresponding with the shadow end points on meeting bridge.
    14. method as claimed in claim 13, wherein also including:On meeting bridge is changed after the distal information of IP points corresponding with the shadow end points, monitored topology connection between end points and descending shadow end points is disconnected, and disconnect the topology connection between the opposite end end points and up shadow end points of monitored opposite end.
    15. method as claimed in claim 10, in addition to:When the opposite end end points of monitored end points changes, disconnect up shadow end points and be connected with monitoring the topology of opposite end.
CNB2004800424304A 2004-04-29 2004-04-29 Medium control method for realizing legal monitoring using soft exchanging system Expired - Fee Related CN100461715C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2004/000431 WO2005107159A1 (en) 2004-04-29 2004-04-29 A media control method for realizing the lawful interception by using the soft-switch system

Publications (2)

Publication Number Publication Date
CN1926807A true CN1926807A (en) 2007-03-07
CN100461715C CN100461715C (en) 2009-02-11

Family

ID=35242016

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800424304A Expired - Fee Related CN100461715C (en) 2004-04-29 2004-04-29 Medium control method for realizing legal monitoring using soft exchanging system

Country Status (2)

Country Link
CN (1) CN100461715C (en)
WO (1) WO2005107159A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111432075A (en) * 2020-03-12 2020-07-17 深圳震有科技股份有限公司 Voice call real-time monitoring method and device based on VOIP network
CN112351145A (en) * 2020-10-27 2021-02-09 山东亚华电子股份有限公司 Monitoring control method and device based on P2P call

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100527731C (en) * 2006-04-29 2009-08-12 华为技术有限公司 Method for associating conference bridge context and calling leg context
CN100442877C (en) * 2006-08-21 2008-12-10 华为技术有限公司 System and method of implementing cluster communication service

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000056029A1 (en) * 1999-03-12 2000-09-21 Nokia Networks Oy Interception system and method
GB0005426D0 (en) * 2000-03-08 2000-04-26 Ericsson Telefon Ab L M Signalling in a telecommunications network
JP3981118B2 (en) * 2002-07-19 2007-09-26 ノキア コーポレイション Method for notifying a legitimate intercept system of a service system that services an intercepted goal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111432075A (en) * 2020-03-12 2020-07-17 深圳震有科技股份有限公司 Voice call real-time monitoring method and device based on VOIP network
CN111432075B (en) * 2020-03-12 2022-03-08 深圳震有科技股份有限公司 Voice call real-time monitoring method and device based on VOIP network
CN112351145A (en) * 2020-10-27 2021-02-09 山东亚华电子股份有限公司 Monitoring control method and device based on P2P call

Also Published As

Publication number Publication date
CN100461715C (en) 2009-02-11
WO2005107159A1 (en) 2005-11-10

Similar Documents

Publication Publication Date Title
JP4901197B2 (en) Soft switch call control method and soft switch device using the method
Davidson Voice over IP fundamentals
US6754180B1 (en) System, method, and computer program product for support of bearer path services in a distributed control network
US7092493B2 (en) Methods and systems for providing lawful intercept of a media stream in a media gateway
CN100531074C (en) Method and system for legally monitoring IP multimedia subsystem network
CN101227533B (en) Apparatus and method for establishing audio conference connection
WO2008116408A1 (en) System, equipment and method for implementing special calling services
WO2004034637A1 (en) A method and system of teleservice interworking of broadband heterogeneous networks
CN102148775B (en) Webpage call service gateway, call service system and method
EP2062426A2 (en) Methods, systems, and computer program products for associating independent legs of a call in a telecommunications network
CN100450024C (en) Method for monitoring multi-medium sub-system domain
CN101005402B (en) Information report method of SIP user agent service switching
WO2007093116A1 (en) A method and system for realizing the simulating service and the access signaling adaptive entity
CN100463404C (en) Method for implementing telephone conference service by using media resource server
CN100461715C (en) Medium control method for realizing legal monitoring using soft exchanging system
CN1559133B (en) Network gateway device and communications system for real item communication connections
CN100589493C (en) Call management system, method for IMS terminal, and IMS terminal
CN100550784C (en) Realize system, the methods and applications server of Lawful Interception in the next generation network
CN100401730C (en) Method for realizing user's self difined recording by media gate control protocol
CN100596093C (en) Implementing method of intelligent media flow bypass
CN100417166C (en) Method for implementing simultaneous multichannel playing in session
CN100527727C (en) Method and system for duplicating medium flow in next-generation network
KR100640289B1 (en) Method of internet protocol terminals for providing a plurality of call services and ip terminals enabling the method
CN100583786C (en) Legal listening system, method, and application server
CN100459542C (en) Method for realizing internet access in next generation network environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090211

Termination date: 20150429

EXPY Termination of patent right or utility model